andigandhi / bitpixieLinks
bitpixie Proof of Concept - Bitlocker Decryptor
☆110Updated 2 months ago
Alternatives and similar repositories for bitpixie
Users that are interested in bitpixie are comparing it to the libraries listed below
Sorting:
- Bitpixie exploitation PoC☆82Updated last month
- ☆81Updated 3 years ago
- Volatility plugin to retrieve the Full Volume Encryption Key in memory. The FVEK can then be used with the help of Dislocker to mount the…☆53Updated 5 years ago
- Diana Credential Recovery Framework☆63Updated 2 months ago
- DPAPILAB Next Gen, script collection☆92Updated 3 years ago
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆145Updated last year
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆125Updated last year
- ☆132Updated 2 years ago
- ☆147Updated last year
- ☆163Updated 5 months ago
- ☆302Updated last year
- Tools for analyzing EDR agents☆272Updated last year
- ☆227Updated 5 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆62Updated 5 months ago
- A list of public attacks on BitLocker☆396Updated 3 months ago
- ☆71Updated 10 months ago
- ☆120Updated last year
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆151Updated 4 months ago
- An interactive shell to spoof some LOLBins command line☆187Updated last year
- A small utility to translate NTDS.dit files to SQLite format.☆79Updated 2 years ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated last year
- ☆192Updated last year
- Automating the MITM attack on WSUS☆277Updated last month
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆161Updated 4 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆75Updated 11 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆328Updated last year
- Direct access to NTFS volumes☆287Updated 2 months ago
- Memory mapping profiles for forensic analysis using volatility 3☆30Updated 3 years ago
- A delicious, but malicious SSL-VPN server 🌮☆255Updated 2 months ago
- ☆68Updated 2 years ago